Optimal integrity policy for secure storage of encrypted data using cloud computing

0Citations
Citations of this article
1Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Cloud computing is very common at reduced price because of its computing and storage ability. To reduce storage costs, an ever increasing number of information are being moved to the cloud. Then again, since the cloud isn't completely dependable, they are usually encrypted before uploading to shield information protection from outsiders and even the cloud server. However, many activities on encrypted information, such as searching, are difficult to conduct. Searchable encryption has emerged to solve this issue. It is much less effective to search for encryption in multi-user environment than in single-user environment. As a foundation of attribute-based encryption to solve this issue a multi-user searchable system is suggested. Our system also keeps information safe in opposition to the cloud server in the cloud. It enables users with suitable permissions to conduct encrypted information search activities. Furthermore, customers generate search tokens instead of information holders. We demonstrate that in our system, token privacy and index privacy are all around ensured. No helpful data about search tokens and ciphertexts can be obtained from the cloud server and illegal users. Our scheme's ciphertexts are constant in size, reducing our scheme's time-complexity and bandwidth overhead.

Cite

CITATION STYLE

APA

Ranganadham, T. N., Durga Bhavani, G. I. K., & Rudra Kumar, M. (2019). Optimal integrity policy for secure storage of encrypted data using cloud computing. International Journal of Innovative Technology and Exploring Engineering, 8(11), 1773–1776. https://doi.org/10.35940/ijitee.K1760.0981119

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free